Secure 5G Working Group
VirtualJoin ATARC's Secure 5G Working Group bi-weekly, Tuesday morning meeting. For more information on ATARC Working Groups contact ATARC's Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.
The 1st NIST PQC Standards
VirtualEight years ago, the National Institute of Standards and Technology (NIST) initiated a public process to select quantum-resistant public-key cryptographic algorithms for standardization. NIST issued the public call for submissions to the PQC Standardization Process in December 2016 and, after three rounds of evaluation and analysis, selected four algorithms for standardization: CRYSTALS-KYBER, CRYSTALS-Dilithium, FALCON, and SPHINCS+. In this talk we will discuss the three current NIST PQC endeavors: drafting standards for the selected algorithms, the remaining algorithms under consideration in the 4th round of evaluation, and the call for additional digital signatures to be considered for future standardization.
Securing the Identity Fabric in the Age of Cloud and Zero Trust
To Be AnnouncedSecuring government agencies against cyber threats is paramount in today’s digital age. This webinar introduces two FedRAMP High Authorized solutions, CyberArk Identity and Endpoint Privilege Manager (EPM), designed to meet and exceed rigorous government security standards. CyberArk Identity simplifies user access with features like Single Sign-On and Multi-Factor Authentication, enhancing security and compliance. Complementing this, EPM protects endpoints by managing user privileges and preventing credential theft, offering an added layer of defense against cyber attacks. This session will showcase how these integrated solutions fortify agency defenses and streamline operational efficiency. Join our panelists as they explore real-life applications of CyberArk’s tools in bolstering government cybersecurity postures and preparing agencies to tackle present and future digital challenges efficiently.
Identity Management Working Group
VirtualJoin ATARC's Identity Management Working Group bi-weekly, Friday morning meeting. For more information on ATARC Working Groups contact ATARC's, Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.
Government Workforce Experience Working Group
VirtualJoin ATARC’s Government Workforce Experience Working Group bi-weekly, Friday afternoon meeting. For more information on ATARC Working Groups contact ATARC’s, Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.
Optimizing Human Performance in Tech Evolution
VirtualPresents Optimizing Human Performance in Tech Evolution In partnership with May 16, 2024, 1:30-2:30 PM ET 1 CPE Credit Available for this Event*** In today's rapidly evolving technological landscape, government agencies face the daunting task of managing advancements in AI, cybersecurity, and more, while ensuring their workforce remains at the peak of performance. In the […]
ATARC Cybersecurity Higher Education & Workforce Development Working Group
VirtualJoin ATARC's Cybersecurity Higher Education & Workforce Development Working Group monthly, Friday afternoon meeting. For more information on ATARC Working Groups contact ATARC's Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.
The Role of Deterrence of Insider Risk Series, Part 1 of 3
VirtualThis webinar (1 of a 3-part series) will focus on deterrence, a continuous function, and critical component of a successful Insider Risk Program.
Our panelists will discuss the challenges and effectiveness of the “5 Cs” of an Insider Risk Program: Communication, culture, character, compliance, and consequences.
Zero Trust Working Group
VirtualJoin ATARC’s Zero Trust Working Group happening every four weeks on Thursday mornings. For more information on ATARC Working Groups contact ATARC’s Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.
Zero Trust Lab Phase 2 Demonstration with GuidePoint Security and Technology Partners
VirtualJoin our ATARC Zero Trust Lab Phase 2 Demonstration with GuidePoint Security and Technology Partners. GuidePoint Security experts have been working with industry leading partners in the federal cybersecurity space, leveraging their capabilities in our Zero Trust lab to build integrated solutions for federal use cases. Recognizing that the traditional perimeter model is failing to protect our most valued data, every one of our technology partners brings a solution that integrates with and complements the core tenets of Zero Trust: “Never trust, always verify.”